CISO
Enter a key term, phrase, name or location to get a selection of only relevant news from all RSS channels.
Enter a domain's or RSS channel's URL to read their news in a convenient way and get a complete analytics on this RSS feed.
In a world interwoven with digital threads, small and medium-sized enterprises (SMEs) need to navigate safely through the expansive cyberspace. While...
Ransomware is a type of malware that encrypts a victim’s files. The attackers then demand a ransom from the victim to restore access to the files upon...
Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for...
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of...
In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in various MS products includes servers & desktops...
After Jennifer Lawrence it is now time to see what hackers have about Kim Kardashian. Private photographs of Kim Kardashian and Vanessa Hudgens, which...
Google Dorking, Also known as “Google hacking,” involves using specialized search parameters to locate very specific information. Examples include: ...
Here is a list of videos published in YouTube about application security. It is a great compilation of video and a must to watch for the application developers...
Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies are on sale after such security...
The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based on the analysis of data from its...
Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts start recommending disabling the...
Unfortunately CISO has no news yet.
But you may check out related channels listed below.
[...] cloud services providers such as CloudFlare. Do you use any? What are your thoughts on the Security services over the cloud? The post Cloud Security Alliance Guidance on Security as a Service (SecaaS) [...]
[...] In the recent past CSA has defined the categories of security services that can be offered as Security as a Service. The functionalities listed in each category as [...]
[...] The cardholder data breach is not a new thing. It is been a nightmare for every CIO in the world. Dancho Danchev’ [...]
[...] the importance of the use of data wipe software for secure disposal of hard drives and USBs. Data security mandates such as ISO 27001, ISO 15408, PCI DSS, HIPAA, SOX and European Union Directives [...]
[...] erasure capabilities. It is a commercial software with license costs starts at $29.95 Data erasure softwares are key for the success of any disposla of media strategies. Using the right tools, you [...]
[...] like updating the code, spreading the code to other machines, discover and collect target data. Detection of an on-going ATP at this phase can be detected by monitoring *. Network [...]
[...] cloud services providers such as CloudFlare. Do you use any? What are your thoughts on the Security services over the cloud? The post Cloud Security Alliance Guidance on Security as a Service (SecaaS) [...]
[...] In the recent past CSA has defined the categories of security services that can be offered as Security as a Service. The functionalities listed in each category as [...]
Related channels
-
CISO.in
Information Security blog
-
Downgraf.com
Downgraf is a best Blog for Designers which provides every kind of design resource. We’re devoted to bring the best cont...
-
EC-Council
C|CISO
-
Autoblog
Autoblog
-
CIO AXIS
Resources for IT Leaders of India - CIO, CTO, CISO, CXO and Head of IT